Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 12:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
celix.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
celix.exe
Resource
win10v2004-20240426-en
4 signatures
150 seconds
General
-
Target
celix.exe
-
Size
1005KB
-
MD5
ee4dd959b79983b179b45f0fe83d8c75
-
SHA1
1b9e77795347d59013957e8678d6729ccad0c942
-
SHA256
671bbcf680e958243a29e29bef775ea9825d01456ba3ac59746555e4892c0ebf
-
SHA512
e0a91481e6f6d757cd4b19396f67c3b89864c409fb18eca49329f76d93cfaea3e4516aa43264e77342a99f9132d4131ce3cf31cd4333711faa532b7c9f2286fc
-
SSDEEP
24576:NvwDbUzDn15DBzSbcoQQREEEikoU2ahQ09GswKt+q2x:xwDbuD15DBzc0xloUthQ0
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" celix.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2192 celix.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2192 celix.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2272 2192 celix.exe 29 PID 2192 wrote to memory of 2272 2192 celix.exe 29 PID 2192 wrote to memory of 2272 2192 celix.exe 29 PID 2192 wrote to memory of 2508 2192 celix.exe 30 PID 2192 wrote to memory of 2508 2192 celix.exe 30 PID 2192 wrote to memory of 2508 2192 celix.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\celix.exe"C:\Users\Admin\AppData\Local\Temp\celix.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color B2⤵PID:2272
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2192 -s 1122⤵PID:2508
-